Analysis

  • max time kernel
    145s
  • max time network
    153s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    24-10-2024 14:02

General

  • Target

    740d7a3e4b5756182e0bc9777d75f047_JaffaCakes118.exe

  • Size

    113KB

  • MD5

    740d7a3e4b5756182e0bc9777d75f047

  • SHA1

    1a25f0e590a035ef27a63b801b49bde4b3b8632d

  • SHA256

    a2697056dbb13ff4ae122354378f194b52f235e99d860f6a7e0a9c048a310681

  • SHA512

    70148abb4dbfc125a514c21b22cb6fbc26d311a0f76e887f1b330230f2eb60e26c24cbb0ef288ccc564992a94218f7cf5a1ea0793245faf42659489f7f248987

  • SSDEEP

    1536:h0jP7/L1B5rVmN8sxHv2M28ix8EUaJxWZoB4u0OVE01:K1VmhaH8EFvW+0OVE0

Malware Config

Signatures

  • WarzoneRat, AveMaria

    WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\740d7a3e4b5756182e0bc9777d75f047_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\740d7a3e4b5756182e0bc9777d75f047_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:2880

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads